1 / 16

Ying QIU, Jianying ZHOU, Feng BAO

Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01. Ying QIU, Jianying ZHOU, Feng BAO . Motivation. The demand of wireless sensor networks is growing exponentially.

baina
Download Presentation

Ying QIU, Jianying ZHOU, Feng BAO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networksdraft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng BAO

  2. Motivation • The demand of wireless sensor networks is growing exponentially. • A moving sensor mote needs to change its attached routers (or cluster heads) frequently. • The router (or cluster head) needs to ensure the joining mote is not a malicious sensor. • The moving mote needs to establish a security tunnel with the new route (or cluster head).

  3. Problem Statement(RFC4919, 5548, 5673, 5826, 5867) • Resource limitation • power, computation, communication, memory … • Wireless nature of communication; • open wireless channel, everyone can catch the traffic packets • Very large and dense WSN; • ID and key management • Location not predefined and moving • impossible to pre-configure • Unreliable devices • high risk of physical attacks to unattended sensors; • Small packet size • Handover Speed • Support 16 and 64 bit addresses

  4. Protocol • Shared key discovery: • each sensor only store a small set of keys randomly selected from a key pool at the deployment. Two nodes may use the key discovery protocol to find a common key from their own sets. • saving communication • Key establishment and update: • an efficient and scalable scheme to establish and update the keys among nodes. • Authentication and encryption: • describe how to use node’s ID information to authenticate and encrypt the traffic packets. • Distribution Mode: • the more hops, the poorer the traffic performance and the more energy consumption. • deploy the cluster heads as the sub-base-stations. • Key revocation: • if a node is compromised, the base station should revoke the related keys from the database and inform the relevant nodes.

  5. Shared Key Discovery • reduce communication • data transmission costs much energy than the computing • a sensor may only store a small set of keys randomly selected from a key pool at the deployment • a sensor’s memory is very limited • neighbors are impossible to pre-configure • two nodes may use any existed key discovery protocol to find a common key from their own sets.

  6. Router APRV NOTICE Dynamic sensor node BaseStation REQ Key Establishment req = {src=ID, Dst= BS, RT || R0 || MAC(KBN, ID||RT||R0) } (1) KNR = H(KBN, ID|| R0 || R1 ) (2) aprv = {src=BS, dst=RT, E(KBT, ID||R0||R1|| KNR )} (3) notice = {src=RT, Dst=ID, R0 || R1 || MAC(KNR, RT||ID|| R0||R1 )} (4)

  7. Key Management

  8. Key Management

  9. Distribution Mode • Each cluster head manages to establish the shared key with its neighbour cluster heads after deployment. • Each sensor node keeps two base station IDs: real base station ID and sub-base-station ID. • After deployment, the first round for a mobile node to establish the shared key with the nearest cluster head uses the basic protocol. • When the mobile node moves, use the basic protocol to establish the shared key with the new cluster head, via the sold cluster head rather than the real base station. • After successfully establishing the keys, the sensor node updates the ID of sub-base-station with the current cluster head. • For security reasons, each sensor node must reset its sub-base-station ID to the real base station at a specified interval (say a few hours or days, depending on the various applications) and re-establish keys with its near cluster heads via the real base station. If the base station does not receive any request from a sensor node, it considers the sensor node has been compromised.

  10. Features • Suitable for both static and dynamic WSN. Any pair of nodes can establish a key for secure communication. • Easily scalable • A roaming note only deals with its closest router for security. No need to change the rest routing path to the base station. • Less signalling, hence less power cost • Base station can manage the revocation list for lost or compromised roaming motes. • Stronger security • System is scalable and resilient against node compromise. • Stronger security

  11. Satisfy the Routing Requirements (1) draft-ietf-6lowpan-routing-requirements [R01] 6LoWPAN routing protocols SHOULD allow implementation with small code size and require low routing state to fit the typical 6LoWPAN node capacity. Yes. The cache of key management is variable. [R02] 6LoWPAN routing protocols SHOULD cause minimal power consumption by the efficient use of control packets and by the efficient routing of data packets. Yes. Reduce the number and size of signalling messages. [R03] 6LoWPAN routing protocol control messages SHOULD NOT exceed a single IEEE 802.15.4 frame size in order to avoid packet fragmentation and the overhead for reassembly. Yes. Every signalling message is included in 1 packet. [R04] The design of routing protocols for LoWPANs must consider the fact that packets are to be delivered with sufficient probability according to application requirements. N/A

  12. Satisfy the Routing Requirements (2) [R05] The design of routing protocols for LoWPANs must consider the latency requirements of applications and IEEE 802.15.4 link latency characteristics. Yes. Distribution mode. [R06] 6LoWPAN routing protocols SHOULD be robust to dynamic loss caused by link failure or device unavailability either in the short term or in the long term. Yes. The use of nonce R0 & R1 as well as key revoketion. [R07] 6LoWPAN routing protocols SHOULD be designed to correctly operate in the presence of link asymmetry. Yes. [R08] 6LoWPAN routing protocols SHOULD be reliable despite unresponsive nodes due to periodic hibernation. Yes. The use of nonce R0 & R1. [R09] The metric used by 6LoWPAN routing protocols MAY utilize a combination of the inputs provided by the lower layers and other measures to optimize path selection considering energy balance and link qualities. Yes. Any pair of nodes can establish a key.

  13. Satisfy the Routing Requirements (3) [R10] 6LoWPAN routing protocols SHOULD be designed to achieve both scalability from a few nodes to maybe millions of nodes and minimality in terms of used system resources. Yes. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) [R11] The procedure of route repair and related control messages should not harm overall energy consumption from the routing protocols. N/A [R12] 6LoWPAN routing protocols SHOULD allow for dynamically adaptive topologies and mobile nodes. Yes. It’s the motivation of designing the protocol [R13] A 6LoWPAN routing protocol SHOULD support various traffic patterns. N/A [R14] 6LoWPAN protocols SHOULD support secure delivery of control messages. Yes. The protocol is regarding the established the session keys.

  14. Satisfy the Routing Requirements (4) [R15] When a routing protocol operates in 6LoWPAN's adaptation layer, routing tables and neighbor lists MUST support 16-bit short and 64-bit extended addresses.. Packet format will be defined in future. [R16] In order to perform discovery and maintenance of neighbors, LoWPAN Nodes SHOULD avoid sending separate "Hello“. N/A [R17] In case there are one or more nodes allocated for the specific role of local management, such a management node MAY take the role of keeping track of nodes within the area of the LoWPAN it takes responsibility for. Yes. The function of sub-basestation [R18] If the routing protocol functionality includes enabling IP multicast, then it may want to employ structure in the network for efficient distribution, or relay points sending point-to-multipoint messages in unicast messages instead of using link-layer multicast (broadcast). N/A

  15. Future Works • Define the transmission format. • Compatible with other related protocols (i.e. 6lowpan-ND) • Feedback and improve.

  16. Thanks Q & A

More Related